SOL-C01 · Question #307
SOL-C01 Question #307: Real Exam Question with Answer & Explanation
The correct answer is B: Using a Snowflake access token generated outside of Streamlit and passing it as a Streamlit. Option B is correct because it uses a more secure approach than hardcoding credentials by leveraging Streamlit secrets for access token management. Option E is also correct as Snowflake OAuth integration allows leveraging standard authentication flows for secure credential handli
Question
A data engineer is building a Snowflake Notebook to perform some data transformations. The notebook interacts with a Snowflake table named 'SALES DATA' which contains columns like 'ORDER ID', 'PRODUCT ID, 'SALE DATE, and `SALE AMOUNT. The engineer wants to use a Streamlit application to visualize the daily sales trends based on the transformed data. However, they are facing challenges with authenticating the Streamlit application to Snowflake and efficiently retrieving the data. Which of the following approaches would provide the most secure and efficient way to authenticate Streamlit to Snowflake and load the necessary data?
Options
- AHardcoding Snowflake credentials (username and password) directly within the Streamlit
- BUsing a Snowflake access token generated outside of Streamlit and passing it as a Streamlit
- CCreating a Snowflake user with extremely broad privileges and storing those credentials as
- DGranting public access to the 'SALES_DATA' table and querying it directly from Streamlit without
- EUsing Snowflake's OAuth integration and leveraging Streamlit's ability to handle authentication
Explanation
Option B is correct because it uses a more secure approach than hardcoding credentials by leveraging Streamlit secrets for access token management. Option E is also correct as Snowflake OAuth integration allows leveraging standard authentication flows for secure credential handling within the streamlit application. Hardcoding credentials (A), creating overly permissive users (C) and granting public access (D) are all significant security risks. Using temporary credentials is the most secure best practice.
Topics
Community Discussion
No community discussion yet for this question.